Author, Consultant, Computer Expert
This segment of the website is to provide a list of research papers that reference Chuck's work, his own research papers, and other information regarding places where his work has had some impact.
Research papers and books that reference Chuck's book Computer Security Fundamentals (Pearson 2005) or Network Defense and Countermeasures (Pearson 2005)
- Adding information assurance to the curriculum - Journal of Computing Sciences in Colleges Volume 22 , Issue 2 (December 2006) Richard Weiss
- Taming the diversity of information assurance & security - Journal of Computing Sciences in Colleges Volume 23 , Issue 4 (April 2008) J. Paul Myers, Sandra Riela
- Effect of Windows XP Firewall on Network Issues in Informing Science and Information Technology Volume 4, 2007 Al-Rawi(King Faisal University Saudi Arabia) ,Lansari (Zayed University UAE)
- Assessing Risks of Policies to Patch Software Vulnerabilities Radianti, Sveen, Gonzalez
- A study of efficient avoidance in the event of DNS(domain name system) failure - Proceedings of the 8thConference on 8th WSEAS International Conference on Automation and Information - Volume 8 Lin, Hwang, Lin.
- Practical computer security: a new service course based upon the national strategy to secure cyberspace David W. Valentine
- Intrusion Detection Systems - Williams, Pabbathi, and Awosanya
- Challenges and Risks of OSS/FS Migration Projects -Candreia
- Embracing the Diversity of Information Assurance & Security - Myers
- A study of efficient avoidance in the event of DNS(domain name system) failure -Yang, Hyon, Hankyu
- Social and Organizational Aspects of Information Security Management -K. Michael
- The Problems and Policy Alternatives for Cyber Security in the Networking Age
By Lee Ki Shik
- Conference On Information Technology Education (formerly CITC)
Proceedings of the 6th conference on Information technology education Association of Computing Machinery
- Thinking Globally: Incorporating an International Component in
Information Security Curricula Garry L. White Ju Long
- Broadening Information Assurance Awareness by Gaming - Hongmei Chi, Edward L. Jones and Jude Desti
- Electronic Voting VIA the Internet - Mark A. Sherer
- Public Perception vs. the Reality of Bluetooth Security - Lech J. Janczewski & Lawrence Wong
- Leadership styles and information security in small businesses: Results of an empirical investigation Debasis Battacharya
- Securing Small Business:- The Role of Information Technology Policy. Batten and Castleman
- The Impact of Virtual Private Network (VPN) on a Company's Network. Powell, J.M.
- Thinking Globally: Incorporating an International Component in Information Security Curricula. Kiswani and Al-Bakari
- Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security White and Long
- Bridging the Gap: Emphasizing to Students the Importants of Management and IT working together. Edge and Wheeler
- Futuristic Construction Communication Infrastructures: Secure and Safe with No Wires -Kazi and Aouad
- Social and Organizational Aspects of Information Security Management - K. Michael University of Wollongong - Faculty of Informatics - Papers
- The Expanded Risk Horizon of Accounting Networks Utilizing Wireless Technology - David R. Fordham -AIS Educator Journal Volume: 4 Issue: 1 2009
- Researches on the IPv6 Network safeguard linked system - Ma Yue, Lian Hong, and Zhang Xiao Feng- Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference 2010
This particular textbook is also recommended by other authors as in this excerpt from Page 15 of CompTIA Security+ Exam Cram (2nd Edition) Diane Barrett, Kirk Hausman, Martin Weiss
“…The two best general information security books we know of are Computer Security Fundamentals by Chuck Easttom (Pearson 2005) and…”
This book is also currently or has recently been used as a textbook at over 25 different universities around the United States and in various other countries.
Research papers and sources that reference Chuck's book Computer Crime, Investigation, and the Law
- Answers.com http://www.answers.com/topic/computer-crime
- Here is a book review of that book http://www.tandfonline.com/doi/abs/10.1080/15614263.2012.708531
- American Public University for their Advanced Cybercrime Analysis graduate course.
- Migration from Microsoft to Linux on Servers and Desktops. -Kumar
- Decision making process in migration from Microsoft to Linux -Kumar
- Open source solutions for small business problems - Locke
Reference Model Based High Fidelity Simulation Modeling For Manufacturing Dissertation Presented to The Academic Faculty by HANSOO KIM In Partial Fulfillment Of the Requirements for the Degree Doctor of Philosophy in the School of Industrial and Systems Engineering Georgia Institute of Technology May 2004
- A Cybercrime course at the University of Akron
Research papers and books that reference Chuck's book Moving from Windows To Linux
In an review done by Entrepeneur.com, Daniel Smith states:
" I've never read a computer book that is so easy to use"
If you wish to read some of Chuck's own papers, on various topics click here.